CVE-2018-20732

9.8 CRITICAL

📋 TL;DR

This vulnerability in SAS Web Infrastructure Platform allows remote attackers to execute arbitrary code through Java deserialization attacks. Attackers can exploit insecure deserialization to run malicious code on affected systems. Organizations using SAS Web Infrastructure Platform versions before 9.4M6 are affected.

💻 Affected Systems

Products:
  • SAS Web Infrastructure Platform
Versions: All versions before 9.4M6
Operating Systems: All platforms running SAS Web Infrastructure Platform
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with default configurations. The vulnerability exists in the Java deserialization mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Remote code execution allowing attackers to install backdoors, steal sensitive data, or disrupt business operations.

🟢

If Mitigated

Limited impact if proper network segmentation, application firewalls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Java deserialization vulnerabilities are well-understood with numerous public exploits available. Attackers can use tools like ysoserial to generate payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4M6 and later

Vendor Advisory: https://support.sas.com/kb/63/391.html

Restart Required: Yes

Instructions:

1. Upgrade to SAS Web Infrastructure Platform 9.4M6 or later. 2. Apply all security patches from SAS. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SAS Web Infrastructure Platform to only trusted sources

Application Firewall Rules

all

Implement WAF rules to block Java deserialization payloads

🧯 If You Can't Patch

  • Isolate affected systems from internet and restrict internal network access
  • Implement strict monitoring and alerting for suspicious Java deserialization activity

🔍 How to Verify

Check if Vulnerable:

Check SAS Web Infrastructure Platform version. If version is earlier than 9.4M6, the system is vulnerable.

Check Version:

Check SAS administration console or configuration files for version information

Verify Fix Applied:

Verify the installed version is 9.4M6 or later and check that no Java deserialization vulnerabilities are present.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java deserialization errors
  • Suspicious class loading
  • Unexpected process execution

Network Indicators:

  • HTTP requests containing serialized Java objects
  • Unusual outbound connections from SAS servers

SIEM Query:

source="sas_web_platform" AND (error="deserialization" OR error="ClassNotFoundException")

🔗 References

📤 Share & Export